US20220084026A1 - Secure transactions - Google Patents
Secure transactions Download PDFInfo
- Publication number
- US20220084026A1 US20220084026A1 US17/420,061 US201917420061A US2022084026A1 US 20220084026 A1 US20220084026 A1 US 20220084026A1 US 201917420061 A US201917420061 A US 201917420061A US 2022084026 A1 US2022084026 A1 US 2022084026A1
- Authority
- US
- United States
- Prior art keywords
- entity
- transaction
- data
- offer
- purchase
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0631—Item recommendations
Definitions
- FIG. 1 shows an apparatus for managing a transaction according to an example.
- FIG. 2 shows a block diagram of a method for storing transaction information to a secure ledger according to an example.
- FIG. 3 shows a processor associated with a memory and comprising instructions for performing managing a transaction according to an example.
- Machine learning algorithms evaluate historic user data or what is also sometimes called training data, to develop a classification algorithm, also known simply as a classifier.
- the classifier can be used on new observations to identify which class those observations belong in.
- a classifier takes the new point and evaluates the new data associated to that point to determine the relevant classes.
- a user may have made a number of historic product purchases which places them in particular subclasses for new product recommendations. This data can be used as training data to develop a classifier. The classifier can be used to place the user in classes for future product recommendations.
- Machine learning algorithms are not deterministic programs.
- the output of the algorithm may depend on the most up-to-date data and run-time factors. For example, in the context of e-commerce environments, a product recommendation that is output by a machine learning algorithm at a later stage might be different from the one recommended at an earlier point in time to a user. This is because the most up-to-date data which is input into the machine learning algorithm can result in a change to the classifier which was used to generate the original product recommendation. This subsequent recommendation may be more or less appealing to a customer. Somewhat frustratingly for the customer, this can result in recommendations which were previously of interest to the customer being lost.
- the methods and systems described herein can be used to achieve this. This may include turning any given product recommendation into a sale offer. In certain cases, the sale offer could be made valid for a period of time, turning a recommendation into a trackable and verifiable transaction. This allows a customer to carry on browsing, compare prices and evaluate other factors which influence final purchase decision without losing an offer of an earlier recommendation.
- the methods and systems described herein propose a mechanism for securing an automatic recommendation, turning it into a digital contract, verifiable and enforceable commitment. This includes converting the recommendation from a suggestion such as from a targeted advert into a business proposition in the form of a fully-fledged transaction. This is achieved using secure ledger technology.
- Secure ledgers can be used in a diverse range of contexts to provide guarantees that certain processes have properly been executed and that tasks have been carried out according to a well-defined process. Secure ledgers implement cryptographic hash functions to ensure the integrity of a process or data represented in the ledger.
- a secure ledger may be implemented as follows: the output of a record or block of an earlier transaction in the ledger is hashed and is used as an input to the next block in a chain. Further data may be input into the next block such a record that a further transaction has occurred. This creates a secure-by-design process where the integrity of any point of the chain can be verified by recomputing hash values on inputs and checking the recomputed hash values against the ledger. In certain examples it is sufficient to check the final output against the last recorded item on the ledger based on the inputs.
- the ledger may be stored in a decentralized fashion.
- the ledger can be stored across a peer-to-peer network where nodes hold their own copy of the ledger and can collectively verify the authenticity of alleged transactions by recomputing ledger data.
- secure ledgers allow the digital facilitation, verification and/or enforcement of the negotiation or performance of a contract. Smart contracts allow the performance of credible transactions without third parties such as legal entities being involved.
- Decentralized cryptocurrencies such as Bitcoin may be considered a form of smart contract between participants.
- Bitcoin and other cryptocurrencies implement a secure ledger which provides a secure and verifiable transaction history which may be verified by anyone at a later point in time.
- Ledger technology digitizes and simplifies many processes which would previously use trusted third-party verification to perform securely. Secure ledgers provide a higher degree of certainty for participants and provide greater security over trusted third-party models.
- the methods and systems described herein implement a secure ledger to record proposals or offers associated to recommendations.
- a targeted consumer is identified by his or her signature-based identity.
- a transaction is generated which specifies an item and a number of attributes associated to the item which may include the price and, in certain cases, a time period in which the offer is valid.
- the transaction may be certified by the system which generated the recommendation in the first place.
- the transaction is recorded on the secure ledger and the consumer may execute at any time, the offer within its validity by creating their own “purchase request” transaction.
- the secure ledger provides a way to ascertain the validity of the offer to the consumer, and the requested purchase will be accepted or declined based on the content of the secure ledger.
- FIG. 1 shows an apparatus 100 for recording a transaction to a secure ledger according to an example.
- the apparatus 100 shown in FIG. 1 can be implemented in software, hardware, or a mix of both software and hardware.
- the apparatus 100 comprises a transaction management module 110 .
- the transaction management module 110 may be implemented in the “cloud” over a network such as the internet.
- the transaction management module 110 may be implemented in hardware or as software implemented on a computer readable medium.
- An entity 120 is in communication with the transaction management module 110 .
- the entity 120 may be a user, group of users, organisation or department within an organisation, for example. According to examples, if the entity 120 communicates over a network interface with the transaction management module.
- Such a network interface may be implemented in hardware on a computing device or as software implemented on a computer readable medium.
- the transaction management module 110 may be implemented as a backend service, in conjunction with a frontend client-facing interface such as a web browser or local application running on the client device. Such an interface may be a graphical user interface which displays purchasable items to the entity 120 .
- the transaction management module 110 is arranged to communicate an offer of an item for sale to entities based on entity identifiers. According to examples, the entity identifier may be used to target particular items for sale to the entity.
- the transaction management module 110 is arranged to initiate a transaction from transaction data which is then recorded in a secure ledger.
- the transaction management module 110 is communicatively coupled to a secure ledger 130 .
- a “secure ledger” is a data structure comprising a sequence of blocks of data. Each block references and is derived from at least one of the previous blocks in the sequence. In addition, each block may comprise additional data corresponding to additional inputs.
- the secure ledger 130 may be implemented in software and stored in data storage by a server. In some cases, the transaction management module 110 and secure ledger 130 are implemented on the same physical server. In other cases, they are implemented at different physical locations.
- transaction data comprising at least an entity identifier for the entity 120 , the items offered for sale, and purchase condition for the items is recorded in the secure ledger 130 .
- the purchase condition may be a purchase price.
- the purchase condition may be a loan period, for example.
- Recording data to the secure ledger 130 comprises computing an initial entry to the secure ledger as a function of the transaction data of an initial transaction. An initial transaction may be used to form the first block in a chain of blocks that comprises the secure ledger 130 .
- computing a subsequent entry to the secure ledger 130 is performed by computing the next block in the secure ledger as a function of the previous entry on the secure ledger 130 together with the transaction data of the latest transaction.
- a cryptographically secure hash function may be used to securely record data into the secure ledger 120 .
- a public key infrastructure is implemented between entities and the transaction management module 110 .
- the entity 120 may be identifiable by a public key.
- the transaction data may specify a number of attributes of items.
- the transaction management module 110 is communicatively coupled to a personalized offer creation module 140 .
- the personalized offer creation module 140 is arranged to access historic transaction data from the secure ledger 130 .
- the personalized offer creation module 140 is arranged to generate personalized offer data relating to the purchase of one or more items based on at least the historic transaction data recorded in the secure ledger 130 .
- the personalized offer may be based on other known information, for example, customer specific or demographic information. In certain examples, this is implemented using one or more machine learning algorithms.
- the personalized offer creation module 140 can use the data stored in the secure ledger 130 and, in certain cases other data to construct a classifier.
- the personalized offer creation module 140 is arranged to communicate the personalized offer data to the transaction management module 110 .
- the transaction management module 110 is arranged to receive a purchase request in the form of purchase request data from the entity 120 .
- the purchase request data may include a request to purchase an item that has been offered to the entity 120 , possibly by the personalized offer creation module 140 .
- the purchase request data further comprises a reference to a previous transaction that has been recorded in the secure ledger 130 and the request if further signed by an entity identifier of the entity 120 , such as his private key corresponding to the known public key of the entity 120 .
- the transaction management module 110 is arranged to identify transaction data based on the reference to the previous transaction in the purchase request data and determine whether to execute a sale to the entity 120 based on the content of the secure ledger 130 . In the case that the transaction data corresponds to data recorded on the secure ledger, then the purchase request will be fulfilled.
- FIG. 2 shows a block diagram of a method 200 to securely execute a transaction according to an example.
- the method 200 may be implemented on the apparatus 100 shown in FIG. 1 .
- an offer of an item for sale is communicated to an entity based on an entity identifier.
- the identifier may be a public key of an entity.
- the offer may be generated from the personalized offer creation module 140 shown in FIG. 1 .
- transaction data specifying the offer of the item for sale to the entity is generated.
- the transaction data comprises at least the entity identifier, the item offered for sale, and a purchase condition for the item.
- the transaction data is stored in a secure ledger such as the secure ledger 130 shown in FIG. 1 .
- the transaction data may be digitally signed by the personalized offer creation module 140 .
- the method 200 shown in FIG. 1 further comprises receiving purchase request data from a first entity.
- the purchase request data comprises a request to purchase an item, a reference to an existing offer transaction, and a first entity identifier.
- Transaction data based on the reference to the existing offer in the purchase request data is identified and a determination of whether to execute a sale to the first entity is made based on the content of the secure ledger.
- the method 200 shown in FIG. 2 may further comprise receiving offer transfer data from the first entity.
- the offer transfer data comprises a request to transfer an offer to purchase an item together with a reference to the previous transaction and an entity identifier of a second entity.
- the method comprises identifying transaction data based on the reference to the previous transaction in the offer transfer data.
- the method 200 comprises receiving purchase request data from the second entity, the purchase request data comprising a request to purchase the item, a reference to an offer transfer, and an identifier of the second entity.
- the method comprises identifying transaction data based on the reference to transfer the offer and determining whether to execute a sale to the second entity based on the content of the secure ledger. In this manner, the methods described herein can be used to transfer offers of items between different users.
- the transaction data specifies a total number of items for sale to entities.
- determining whether to execute a sale or not may further comprise determining whether the number of references to a previous transaction recorded on the secure ledger exceeds the total number of items for sale.
- the transaction data comprises a period of validity of the offer of the item for sale.
- an offer of a sale may be valid for a limited period of time such as 1 month. This information may also be recorded in the secure ledger.
- determining whether to execute a sale also comprises determining whether the time period in which the offer is valid has been exceeded.
- the methods and systems described herein utilise secure ledger technology to provide a recommendation system in contractual and enforceable form. This includes, amongst other things, providing a managed, controlled and binding offer if sale of an item, which can be legally enforced via the secure ledger.
- the methods and systems described herein may provide the ability to lock in recommendations at particular time periods. Certain examples described herein guarantee that purchasers-to-be are trustworthy based on previous purchasing history via the secure ledger.
- Examples in the present disclosure can be provided as methods, systems or machine-readable instructions, such as any combination of software, hardware, firmware or the like.
- Such machine-readable instructions may be included on a computer readable storage medium (including but not limited to disc storage, CD-ROM, optical storage, etc.) having computer readable program codes therein or thereon.
- the machine-readable instructions may, for example, be executed by a general-purpose computer, a special purpose computer, an embedded processor or processors of other programmable data processing devices to realize the functions described in the description and diagrams.
- a processor or processing apparatus may execute the machine-readable instructions.
- modules of apparatus may be implemented by a processor executing machine-readable instructions stored in a memory, or a processor operating in accordance with instructions embedded in logic circuitry.
- processor is to be interpreted broadly to include a CPU, processing unit, ASIC, logic unit, or programmable gate set etc.
- the methods and modules may all be performed by a single processor or divided amongst several processors.
- Such machine-readable instructions may also be stored in a computer readable storage that can guide the computer or other programmable data processing devices to operate in a specific mode.
- the instructions may be provided on a non-transitory computer readable storage medium encoded with instructions, executable by a processor.
- FIG. 3 shows an example of a processor 310 associated with a memory 320 .
- the memory 320 comprises computer readable instructions 330 which are executable by the processor 310 .
- the instructions 330 comprise instruction to, generate a sale offer of an item to an entity based on an entity identifier, the sale offer comprising the item offered and a purchase condition; compute transaction data for the sale offer to the entity; and record the transaction data in a secure ledger.
- Such machine-readable instructions may also be loaded onto a computer or other programmable data processing devices, so that the computer or other programmable data processing devices perform a series of operations to produce computer-implemented processing, thus the instructions executed on the computer or other programmable devices provide an operation for realizing functions specified by flow(s) in the flow charts and/or block(s) in the block diagrams.
- teachings herein may be implemented in the form of a computer software product, the computer software product being stored in a storage medium and comprising a plurality of instructions for making a computer device implement the methods recited in the examples of the present disclosure.
Abstract
Description
- Electronic commerce is an enormous part of the modern commercial landscape. Online, users are frequently targeted with adverts to buy certain products. Personalised adverts and purchase recommendations can help consumers make choices and increase profitability for businesses since recommendations are tailored to individual consumers' needs. Furthermore, personalised purchase recommendations reduce the time that is wasted browsing unwanted items. This may enhance the customer experience.
- Various features of certain examples will be apparent from the detailed description which follows, taken in conjunction with the accompanying drawings, which together illustrate, by way of example, a number of features, wherein:
-
FIG. 1 shows an apparatus for managing a transaction according to an example. -
FIG. 2 shows a block diagram of a method for storing transaction information to a secure ledger according to an example. -
FIG. 3 shows a processor associated with a memory and comprising instructions for performing managing a transaction according to an example. - In the following description, for purposes of explanation, numerous specific details of certain examples are set forth. Reference in the specification to “an example” or similar language means that a particular feature, structure, or characteristic described in connection with the example is included in at least that one example, but not necessarily in other examples.
- Users of the internet will be familiar with targeted advertising. Targeted advertising is a hugely profitable activity and is ubiquitous on the internet. It is in the interest of the user and the advertiser to ensure that the adverts displayed to a user are interesting and relevant for that user. This has not always been the case. In the early days of the internet, adverts and advertising in general was considered more of a nuisance to users.
- However, since the advent of machine learning algorithms, the online shopping experience for consumers has vastly improved. For example, e-commerce recommendation systems automatically generate highly targeted recommendations which users may find useful.
- Machine learning algorithms evaluate historic user data or what is also sometimes called training data, to develop a classification algorithm, also known simply as a classifier. The classifier can be used on new observations to identify which class those observations belong in. In particular, a classifier takes the new point and evaluates the new data associated to that point to determine the relevant classes.
- In the context of e-commerce, a user may have made a number of historic product purchases which places them in particular subclasses for new product recommendations. This data can be used as training data to develop a classifier. The classifier can be used to place the user in classes for future product recommendations.
- Machine learning algorithms are not deterministic programs. The output of the algorithm may depend on the most up-to-date data and run-time factors. For example, in the context of e-commerce environments, a product recommendation that is output by a machine learning algorithm at a later stage might be different from the one recommended at an earlier point in time to a user. This is because the most up-to-date data which is input into the machine learning algorithm can result in a change to the classifier which was used to generate the original product recommendation. This subsequent recommendation may be more or less appealing to a customer. Somewhat frustratingly for the customer, this can result in recommendations which were previously of interest to the customer being lost.
- In certain cases, therefore, it may be desirable to lock in a particular product recommendation. The methods and systems described herein can be used to achieve this. This may include turning any given product recommendation into a sale offer. In certain cases, the sale offer could be made valid for a period of time, turning a recommendation into a trackable and verifiable transaction. This allows a customer to carry on browsing, compare prices and evaluate other factors which influence final purchase decision without losing an offer of an earlier recommendation.
- In particular, the methods and systems described herein propose a mechanism for securing an automatic recommendation, turning it into a digital contract, verifiable and enforceable commitment. This includes converting the recommendation from a suggestion such as from a targeted advert into a business proposition in the form of a fully-fledged transaction. This is achieved using secure ledger technology.
- Secure ledgers can be used in a diverse range of contexts to provide guarantees that certain processes have properly been executed and that tasks have been carried out according to a well-defined process. Secure ledgers implement cryptographic hash functions to ensure the integrity of a process or data represented in the ledger.
- A secure ledger may be implemented as follows: the output of a record or block of an earlier transaction in the ledger is hashed and is used as an input to the next block in a chain. Further data may be input into the next block such a record that a further transaction has occurred. This creates a secure-by-design process where the integrity of any point of the chain can be verified by recomputing hash values on inputs and checking the recomputed hash values against the ledger. In certain examples it is sufficient to check the final output against the last recorded item on the ledger based on the inputs.
- Another feature of a secure ledger is that the ledger may be stored in a decentralized fashion. For example, the ledger can be stored across a peer-to-peer network where nodes hold their own copy of the ledger and can collectively verify the authenticity of alleged transactions by recomputing ledger data.
- Using secure ledgers, it is possible to execute whole protocols and maintain a verifiable record of each step of the protocol. For example, “smart contracts” allow the digital facilitation, verification and/or enforcement of the negotiation or performance of a contract. Smart contracts allow the performance of credible transactions without third parties such as legal entities being involved. Decentralized cryptocurrencies such as Bitcoin may be considered a form of smart contract between participants. Bitcoin and other cryptocurrencies implement a secure ledger which provides a secure and verifiable transaction history which may be verified by anyone at a later point in time.
- Ledger technology digitizes and simplifies many processes which would previously use trusted third-party verification to perform securely. Secure ledgers provide a higher degree of certainty for participants and provide greater security over trusted third-party models.
- The methods and systems described herein implement a secure ledger to record proposals or offers associated to recommendations. A targeted consumer is identified by his or her signature-based identity. A transaction is generated which specifies an item and a number of attributes associated to the item which may include the price and, in certain cases, a time period in which the offer is valid. The transaction may be certified by the system which generated the recommendation in the first place.
- The transaction is recorded on the secure ledger and the consumer may execute at any time, the offer within its validity by creating their own “purchase request” transaction. The secure ledger provides a way to ascertain the validity of the offer to the consumer, and the requested purchase will be accepted or declined based on the content of the secure ledger.
-
FIG. 1 shows anapparatus 100 for recording a transaction to a secure ledger according to an example. Theapparatus 100 shown inFIG. 1 can be implemented in software, hardware, or a mix of both software and hardware. Theapparatus 100 comprises atransaction management module 110. Thetransaction management module 110 may be implemented in the “cloud” over a network such as the internet. Thetransaction management module 110 may be implemented in hardware or as software implemented on a computer readable medium. Anentity 120 is in communication with thetransaction management module 110. In examples theentity 120 may be a user, group of users, organisation or department within an organisation, for example. According to examples, if theentity 120 communicates over a network interface with the transaction management module. Such a network interface may be implemented in hardware on a computing device or as software implemented on a computer readable medium. - The
transaction management module 110 may be implemented as a backend service, in conjunction with a frontend client-facing interface such as a web browser or local application running on the client device. Such an interface may be a graphical user interface which displays purchasable items to theentity 120. Thetransaction management module 110 is arranged to communicate an offer of an item for sale to entities based on entity identifiers. According to examples, the entity identifier may be used to target particular items for sale to the entity. - In contrast making recommendations on a purely non-obligatory advisory basis, the
transaction management module 110 is arranged to initiate a transaction from transaction data which is then recorded in a secure ledger. To this end, thetransaction management module 110 is communicatively coupled to asecure ledger 130. According to examples described herein a “secure ledger” is a data structure comprising a sequence of blocks of data. Each block references and is derived from at least one of the previous blocks in the sequence. In addition, each block may comprise additional data corresponding to additional inputs. Thesecure ledger 130 may be implemented in software and stored in data storage by a server. In some cases, thetransaction management module 110 andsecure ledger 130 are implemented on the same physical server. In other cases, they are implemented at different physical locations. - According to examples described herein, transaction data comprising at least an entity identifier for the
entity 120, the items offered for sale, and purchase condition for the items is recorded in thesecure ledger 130. In examples, the purchase condition may be a purchase price. In other cases, the purchase condition may be a loan period, for example. Recording data to thesecure ledger 130 comprises computing an initial entry to the secure ledger as a function of the transaction data of an initial transaction. An initial transaction may be used to form the first block in a chain of blocks that comprises thesecure ledger 130. - According to examples, computing a subsequent entry to the
secure ledger 130, is performed by computing the next block in the secure ledger as a function of the previous entry on thesecure ledger 130 together with the transaction data of the latest transaction. According to examples described herein a cryptographically secure hash function may be used to securely record data into thesecure ledger 120. In certain cases, a public key infrastructure is implemented between entities and thetransaction management module 110. In this case, theentity 120 may be identifiable by a public key. The transaction data may specify a number of attributes of items. - In the example shown in
FIG. 1 , thetransaction management module 110 is communicatively coupled to a personalizedoffer creation module 140. The personalizedoffer creation module 140 is arranged to access historic transaction data from thesecure ledger 130. According to examples, the personalizedoffer creation module 140 is arranged to generate personalized offer data relating to the purchase of one or more items based on at least the historic transaction data recorded in thesecure ledger 130. In examples, the personalized offer may be based on other known information, for example, customer specific or demographic information. In certain examples, this is implemented using one or more machine learning algorithms. The personalizedoffer creation module 140 can use the data stored in thesecure ledger 130 and, in certain cases other data to construct a classifier. The personalizedoffer creation module 140 is arranged to communicate the personalized offer data to thetransaction management module 110. - According to examples described herein the
transaction management module 110 is arranged to receive a purchase request in the form of purchase request data from theentity 120. The purchase request data may include a request to purchase an item that has been offered to theentity 120, possibly by the personalizedoffer creation module 140. The purchase request data further comprises a reference to a previous transaction that has been recorded in thesecure ledger 130 and the request if further signed by an entity identifier of theentity 120, such as his private key corresponding to the known public key of theentity 120. - According to examples described herein, the
transaction management module 110 is arranged to identify transaction data based on the reference to the previous transaction in the purchase request data and determine whether to execute a sale to theentity 120 based on the content of thesecure ledger 130. In the case that the transaction data corresponds to data recorded on the secure ledger, then the purchase request will be fulfilled. -
FIG. 2 shows a block diagram of amethod 200 to securely execute a transaction according to an example. Themethod 200 may be implemented on theapparatus 100 shown inFIG. 1 . Atblock 210 an offer of an item for sale is communicated to an entity based on an entity identifier. As previously described the identifier may be a public key of an entity. The offer may be generated from the personalizedoffer creation module 140 shown inFIG. 1 . Atblock 220 transaction data specifying the offer of the item for sale to the entity is generated. - The transaction data comprises at least the entity identifier, the item offered for sale, and a purchase condition for the item. At
block 230, the transaction data is stored in a secure ledger such as thesecure ledger 130 shown inFIG. 1 . According to examples described herein, the transaction data may be digitally signed by the personalizedoffer creation module 140. - According to an example, the
method 200 shown inFIG. 1 further comprises receiving purchase request data from a first entity. The purchase request data comprises a request to purchase an item, a reference to an existing offer transaction, and a first entity identifier. Transaction data based on the reference to the existing offer in the purchase request data is identified and a determination of whether to execute a sale to the first entity is made based on the content of the secure ledger. - According to an example, the
method 200 shown inFIG. 2 may further comprise receiving offer transfer data from the first entity. The offer transfer data comprises a request to transfer an offer to purchase an item together with a reference to the previous transaction and an entity identifier of a second entity. The method comprises identifying transaction data based on the reference to the previous transaction in the offer transfer data. - In a further example, the
method 200 comprises receiving purchase request data from the second entity, the purchase request data comprising a request to purchase the item, a reference to an offer transfer, and an identifier of the second entity. The method comprises identifying transaction data based on the reference to transfer the offer and determining whether to execute a sale to the second entity based on the content of the secure ledger. In this manner, the methods described herein can be used to transfer offers of items between different users. - In certain cases, the transaction data specifies a total number of items for sale to entities. In this case, determining whether to execute a sale or not may further comprise determining whether the number of references to a previous transaction recorded on the secure ledger exceeds the total number of items for sale.
- In further examples, the transaction data comprises a period of validity of the offer of the item for sale. For example, an offer of a sale may be valid for a limited period of time such as 1 month. This information may also be recorded in the secure ledger. In such a case, determining whether to execute a sale also comprises determining whether the time period in which the offer is valid has been exceeded.
- The methods and systems described herein utilise secure ledger technology to provide a recommendation system in contractual and enforceable form. This includes, amongst other things, providing a managed, controlled and binding offer if sale of an item, which can be legally enforced via the secure ledger.
- Furthermore, in contrast to systems, which merely provide in-the-moment recommendations of sale items which may or may not be of interest to a customer, the methods and systems described herein may provide the ability to lock in recommendations at particular time periods. Certain examples described herein guarantee that purchasers-to-be are trustworthy based on previous purchasing history via the secure ledger.
- Examples in the present disclosure can be provided as methods, systems or machine-readable instructions, such as any combination of software, hardware, firmware or the like. Such machine-readable instructions may be included on a computer readable storage medium (including but not limited to disc storage, CD-ROM, optical storage, etc.) having computer readable program codes therein or thereon.
- The present disclosure is described with reference to flow charts and/or block diagrams of the method, devices and systems according to examples of the present disclosure. Although the flow diagrams described above show a specific order of execution, the order of execution may differ from that which is depicted.
- Blocks described in relation to one flow chart may be combined with those of another flow chart. In some examples, some blocks of the flow diagrams may not be necessary and/or additional blocks may be added. It shall be understood that each flow and/or block in the flow charts and/or block diagrams, as well as combinations of the flows and/or diagrams in the flow charts and/or block diagrams can be realized by machine readable instructions.
- The machine-readable instructions may, for example, be executed by a general-purpose computer, a special purpose computer, an embedded processor or processors of other programmable data processing devices to realize the functions described in the description and diagrams. In particular, a processor or processing apparatus may execute the machine-readable instructions. Thus, modules of apparatus may be implemented by a processor executing machine-readable instructions stored in a memory, or a processor operating in accordance with instructions embedded in logic circuitry.
- The term ‘processor’ is to be interpreted broadly to include a CPU, processing unit, ASIC, logic unit, or programmable gate set etc. The methods and modules may all be performed by a single processor or divided amongst several processors.
- Such machine-readable instructions may also be stored in a computer readable storage that can guide the computer or other programmable data processing devices to operate in a specific mode.
- For example, the instructions may be provided on a non-transitory computer readable storage medium encoded with instructions, executable by a processor.
-
FIG. 3 shows an example of aprocessor 310 associated with amemory 320. Thememory 320 comprises computerreadable instructions 330 which are executable by theprocessor 310. Theinstructions 330 comprise instruction to, generate a sale offer of an item to an entity based on an entity identifier, the sale offer comprising the item offered and a purchase condition; compute transaction data for the sale offer to the entity; and record the transaction data in a secure ledger. - Such machine-readable instructions may also be loaded onto a computer or other programmable data processing devices, so that the computer or other programmable data processing devices perform a series of operations to produce computer-implemented processing, thus the instructions executed on the computer or other programmable devices provide an operation for realizing functions specified by flow(s) in the flow charts and/or block(s) in the block diagrams.
- Further, the teachings herein may be implemented in the form of a computer software product, the computer software product being stored in a storage medium and comprising a plurality of instructions for making a computer device implement the methods recited in the examples of the present disclosure.
- The word “comprising” does not exclude the presence of elements other than those listed in a claim, “a” or “an” does not exclude a plurality, and a single processor or other unit may fulfil the functions of several units recited in the claims.
- The features of any dependent claim may be combined with the features of any of the independent claims or other dependent claims.
Claims (15)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2019/012911 WO2020145964A1 (en) | 2019-01-09 | 2019-01-09 | Secure transactions |
Publications (1)
Publication Number | Publication Date |
---|---|
US20220084026A1 true US20220084026A1 (en) | 2022-03-17 |
Family
ID=71520412
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/420,061 Abandoned US20220084026A1 (en) | 2019-01-09 | 2019-01-09 | Secure transactions |
Country Status (2)
Country | Link |
---|---|
US (1) | US20220084026A1 (en) |
WO (1) | WO2020145964A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11593799B2 (en) * | 2019-02-01 | 2023-02-28 | EMC IP Holding Company LLC | Message-less B2B transaction processing |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050182683A1 (en) * | 2004-02-12 | 2005-08-18 | Steven Tischer | Systems, methods, and a storage medium for obtaining an offer for a sale of a product or a service |
US20190013948A1 (en) * | 2017-07-07 | 2019-01-10 | Microsoft Technology Licensing, Llc | Internet of things blockchain interface |
US20190102850A1 (en) * | 2017-09-29 | 2019-04-04 | David McMakin Wheeler | Smart city commodity exchange with smart contracts |
US20190180329A1 (en) * | 2017-12-10 | 2019-06-13 | International Business Machines Corporation | Cognitive determination system connecting social network and blockchain network |
US20200051166A1 (en) * | 2018-08-13 | 2020-02-13 | TICKETSOCKET KOREA Co., Ltd. | System and method for trading assets among parties through tokenization of assets |
US11244340B1 (en) * | 2018-01-19 | 2022-02-08 | Intuit Inc. | Method and system for using machine learning techniques to identify and recommend relevant offers |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5613012A (en) * | 1994-11-28 | 1997-03-18 | Smarttouch, Llc. | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
WO2004038528A2 (en) * | 2002-10-23 | 2004-05-06 | Medialingua Group | Method of digital certificate (dc) composition, issuance and management providing multitier dc distribution model and multiple accounts access based on the use of dc and public key infrastructure (pki) |
FR2885246B1 (en) * | 2005-04-29 | 2007-06-15 | Thales Sa | SAFE TERMINAL OF SECURE ELECTRONIC TRANSACTIONS AND SECURE ELECTRONIC TRANSACTION SYSTEM |
-
2019
- 2019-01-09 WO PCT/US2019/012911 patent/WO2020145964A1/en active Application Filing
- 2019-01-09 US US17/420,061 patent/US20220084026A1/en not_active Abandoned
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050182683A1 (en) * | 2004-02-12 | 2005-08-18 | Steven Tischer | Systems, methods, and a storage medium for obtaining an offer for a sale of a product or a service |
US20190013948A1 (en) * | 2017-07-07 | 2019-01-10 | Microsoft Technology Licensing, Llc | Internet of things blockchain interface |
US20190102850A1 (en) * | 2017-09-29 | 2019-04-04 | David McMakin Wheeler | Smart city commodity exchange with smart contracts |
US20190180329A1 (en) * | 2017-12-10 | 2019-06-13 | International Business Machines Corporation | Cognitive determination system connecting social network and blockchain network |
US11244340B1 (en) * | 2018-01-19 | 2022-02-08 | Intuit Inc. | Method and system for using machine learning techniques to identify and recommend relevant offers |
US20200051166A1 (en) * | 2018-08-13 | 2020-02-13 | TICKETSOCKET KOREA Co., Ltd. | System and method for trading assets among parties through tokenization of assets |
Non-Patent Citations (1)
Title |
---|
"Security Tip (ST04-018) Understanding Digital Signatures," Cybersecurity & Infrastructure Security Agency, dated Dec 17, 2009 https://www.cisa.gov/uscert/ncas/tips/ST04-018 (hereinafter "Cybersecurity") (Year: 2009) * |
Also Published As
Publication number | Publication date |
---|---|
WO2020145964A1 (en) | 2020-07-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11875400B2 (en) | Systems, methods, and apparatuses for dynamically assigning nodes to a group within blockchains based on transaction type and node intelligence using distributed ledger technology (DLT) | |
US20210367764A1 (en) | Blockchain analytics | |
CN108805656B (en) | Supply and demand matching method, platform, system and computer readable storage medium | |
US20180357683A1 (en) | Rating data management | |
Pasdar et al. | Connect api with blockchain: A survey on blockchain oracle implementation | |
US11037118B2 (en) | Zero knowledge third party guarantee of service on decentralized computing platform | |
KR20210068031A (en) | Methods and systems for providing targeted advertising to consumer devices | |
WO2018222797A1 (en) | Systems and methods for product review management with distributed database | |
US11562451B1 (en) | Apparatus for proportional calculation regarding non-fungible tokens | |
US20230004970A1 (en) | Distributed Ledgers with Ledger Entries Containing Redactable Payloads | |
US20220391887A1 (en) | Systems and Methods for Maintenance of NFT Assets | |
US20220311611A1 (en) | Reputation profile propagation on blockchain networks | |
US20230120534A1 (en) | Methods for Conditional Transaction Tokens, Secure Sharing of Token Assets, Wallet Spam Protection, and User Interfaces for Acceptance of Terms | |
CN115730277A (en) | Supplemental digital content access control using non-homogeneous token NFT | |
US20230055618A1 (en) | Systems and Methods for Management of Token Interactions | |
CN111936994A (en) | Block chain based document registration for customs clearance | |
CN115080858A (en) | Data recommendation method and device under multi-party collaboration scene | |
CN115705571A (en) | Protecting privacy of auditable accounts | |
US20220084026A1 (en) | Secure transactions | |
US11804950B2 (en) | Parallel processing of blockchain procedures | |
US20230070625A1 (en) | Graph-based analysis and visualization of digital tokens | |
KR102169311B1 (en) | Subscription method using smart contract based block chain | |
CN110782352A (en) | Divisible digital asset transaction method and device based on intelligent contract | |
US20220400017A1 (en) | Grinding Resistant Cryptographic Systems and Cryptographic Systems Based on Certified Miners | |
US20230198785A1 (en) | Computer-implemented digital communication using cryptography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: HP PRINTING AND COMPUTING SOLUTIONS, S.L.U., SPAIN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ABAD PEIRO, JOSEP;REEL/FRAME:056981/0836 Effective date: 20190101 Owner name: HP INC UK LIMITED, UNITED KINGDOM Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BALINSKY, HELEN;REEL/FRAME:056979/0533 Effective date: 20190103 |
|
AS | Assignment |
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HP PRINTING AND COMPUTING SOLUTIONS, S.L.U.;HP INC UK LIMITED;SIGNING DATES FROM 20191125 TO 20210727;REEL/FRAME:056992/0741 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |